JP6018346B2 - 情報処理システム、制御方法及び制御プログラム - Google Patents
情報処理システム、制御方法及び制御プログラム Download PDFInfo
- Publication number
- JP6018346B2 JP6018346B2 JP2016529276A JP2016529276A JP6018346B2 JP 6018346 B2 JP6018346 B2 JP 6018346B2 JP 2016529276 A JP2016529276 A JP 2016529276A JP 2016529276 A JP2016529276 A JP 2016529276A JP 6018346 B2 JP6018346 B2 JP 6018346B2
- Authority
- JP
- Japan
- Prior art keywords
- information
- data
- information processing
- virtual
- tag
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2014124599 | 2014-06-17 | ||
JP2014124599 | 2014-06-17 | ||
PCT/JP2015/066771 WO2015194438A1 (ja) | 2014-06-17 | 2015-06-10 | 情報処理システム、制御方法及び制御プログラム |
Publications (2)
Publication Number | Publication Date |
---|---|
JP6018346B2 true JP6018346B2 (ja) | 2016-11-02 |
JPWO2015194438A1 JPWO2015194438A1 (ja) | 2017-04-20 |
Family
ID=54935425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2016529276A Active JP6018346B2 (ja) | 2014-06-17 | 2015-06-10 | 情報処理システム、制御方法及び制御プログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US10248790B2 (zh) |
EP (1) | EP3139298B1 (zh) |
JP (1) | JP6018346B2 (zh) |
CN (1) | CN106663170B (zh) |
WO (1) | WO2015194438A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11134089B2 (en) | 2017-03-30 | 2021-09-28 | Nec Corporation | Malware analysis method, malware analysis device, and malware analysis system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11016874B2 (en) * | 2018-09-19 | 2021-05-25 | International Business Machines Corporation | Updating taint tags based on runtime behavior profiles |
US11340835B2 (en) * | 2020-07-28 | 2022-05-24 | Dell Products L.P. | Virtual non-volatile memory system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005534092A (ja) * | 2002-07-23 | 2005-11-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | プログラムの潜在的にワームのような挙動の自動決定の方法および装置 |
US20110307951A1 (en) * | 2010-06-11 | 2011-12-15 | M86 Security, Inc. | System and method for blocking the transmission of sensitive data using dynamic data tainting |
JP2011257901A (ja) * | 2010-06-08 | 2011-12-22 | Nippon Telegr & Teleph Corp <Ntt> | 解析システム、解析装置、解析方法及び解析プログラム |
US20130145463A1 (en) * | 2011-12-02 | 2013-06-06 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
WO2014188780A1 (ja) * | 2013-05-20 | 2014-11-27 | 日本電信電話株式会社 | 情報処理装置及び特定方法 |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5732080A (en) * | 1995-07-12 | 1998-03-24 | Bay Networks, Inc. | Method and apparatus for controlling data flow within a switching device |
US8898788B1 (en) * | 2004-04-01 | 2014-11-25 | Fireeye, Inc. | Systems and methods for malware attack prevention |
US8584239B2 (en) * | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
US8171553B2 (en) | 2004-04-01 | 2012-05-01 | Fireeye, Inc. | Heuristic based capture with replay to virtual machine |
US9027135B1 (en) * | 2004-04-01 | 2015-05-05 | Fireeye, Inc. | Prospective client identification using malware attack detection |
US7908653B2 (en) * | 2004-06-29 | 2011-03-15 | Intel Corporation | Method of improving computer security through sandboxing |
US20070079366A1 (en) | 2005-10-03 | 2007-04-05 | Microsoft Corporation | Stateless bi-directional proxy |
JP4899087B2 (ja) * | 2006-03-24 | 2012-03-21 | 富士通株式会社 | 伝送システム |
US8127360B1 (en) * | 2006-06-29 | 2012-02-28 | Symantec Corporation | Method and apparatus for detecting leakage of sensitive information |
US20090300751A1 (en) * | 2008-05-30 | 2009-12-03 | Balachander Krishnamurthy | Unique packet identifiers for preventing leakage of sensitive information |
JP5437964B2 (ja) | 2010-10-06 | 2014-03-12 | 日本電信電話株式会社 | 解析方法、解析装置及び解析プログラム |
CN102075617A (zh) | 2010-12-02 | 2011-05-25 | 惠州Tcl移动通信有限公司 | 阻止手机病毒自动发送短消息的方法及其装置 |
CN102413134A (zh) | 2011-11-17 | 2012-04-11 | 宇龙计算机通信科技(深圳)有限公司 | 一种传送数据的方法、系统及通信终端 |
-
2015
- 2015-06-10 CN CN201580032199.9A patent/CN106663170B/zh active Active
- 2015-06-10 WO PCT/JP2015/066771 patent/WO2015194438A1/ja active Application Filing
- 2015-06-10 JP JP2016529276A patent/JP6018346B2/ja active Active
- 2015-06-10 EP EP15809912.7A patent/EP3139298B1/en active Active
- 2015-06-10 US US15/316,667 patent/US10248790B2/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005534092A (ja) * | 2002-07-23 | 2005-11-10 | インターナショナル・ビジネス・マシーンズ・コーポレーション | プログラムの潜在的にワームのような挙動の自動決定の方法および装置 |
JP2011257901A (ja) * | 2010-06-08 | 2011-12-22 | Nippon Telegr & Teleph Corp <Ntt> | 解析システム、解析装置、解析方法及び解析プログラム |
US20110307951A1 (en) * | 2010-06-11 | 2011-12-15 | M86 Security, Inc. | System and method for blocking the transmission of sensitive data using dynamic data tainting |
US20130145463A1 (en) * | 2011-12-02 | 2013-06-06 | Invincea, Inc. | Methods and apparatus for control and detection of malicious content using a sandbox environment |
WO2014188780A1 (ja) * | 2013-05-20 | 2014-11-27 | 日本電信電話株式会社 | 情報処理装置及び特定方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11134089B2 (en) | 2017-03-30 | 2021-09-28 | Nec Corporation | Malware analysis method, malware analysis device, and malware analysis system |
Also Published As
Publication number | Publication date |
---|---|
JPWO2015194438A1 (ja) | 2017-04-20 |
CN106663170A (zh) | 2017-05-10 |
EP3139298A4 (en) | 2017-12-13 |
US20170206356A1 (en) | 2017-07-20 |
CN106663170B (zh) | 2019-06-25 |
EP3139298A1 (en) | 2017-03-08 |
EP3139298B1 (en) | 2019-10-16 |
WO2015194438A1 (ja) | 2015-12-23 |
US10248790B2 (en) | 2019-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10009381B2 (en) | System and method for threat-driven security policy controls | |
US9294442B1 (en) | System and method for threat-driven security policy controls | |
JP2019512791A (ja) | クラウド環境における動的かつ一時的な仮想マシンインスタンスの保護 | |
JP5965059B2 (ja) | 情報処理装置及び特定方法 | |
WO2018131199A1 (ja) | 結合装置、結合方法および結合プログラム | |
WO2019184664A1 (zh) | 恶意文件的检测方法、设备和系统 | |
JP6018346B2 (ja) | 情報処理システム、制御方法及び制御プログラム | |
CN107391999B (zh) | 封装其它凭据提供者的凭据提供者 | |
JP2014179025A (ja) | 接続先情報抽出装置、接続先情報抽出方法、及び接続先情報抽出プログラム | |
US20180316696A1 (en) | Analysis apparatus, analysis method, and analysis program | |
US20210274021A1 (en) | Securing internal services in a distributed environment | |
JP6092759B2 (ja) | 通信制御装置、通信制御方法、および通信制御プログラム | |
JP5876399B2 (ja) | 不正プログラム実行システム、不正プログラム実行方法及び不正プログラム実行プログラム | |
JP6314036B2 (ja) | マルウェア特徴抽出装置、マルウェア特徴抽出システム、マルウェア特徴方法及び対策指示装置 | |
JP6676790B2 (ja) | リクエスト制御装置、リクエスト制御方法、および、リクエスト制御プログラム | |
JP6911723B2 (ja) | ネットワーク監視装置、ネットワーク監視方法及びネットワーク監視プログラム | |
WO2020255185A1 (ja) | 攻撃グラフ加工装置、方法およびプログラム | |
KR102156600B1 (ko) | 네트워크에서 수집된 패킷과 엔드포인트 컴퓨팅 장치의 프로세스 간의 연관관계를 생성하는 시스템 및 방법 | |
JP2019125243A (ja) | マルウェア検知システムおよびマルウェア検知方法 | |
JP2017162042A (ja) | 不正処理解析装置、および不正処理解析方法 | |
CN108289032B (zh) | 一种数据传输方法及装置 | |
JP6687844B2 (ja) | マルウエア解析装置、マルウエア解析方法及びマルウエア解析プログラム | |
Joshi et al. | A Survey of Hypervisor Forensic in Cloud Computing | |
JP2012083799A (ja) | ファイル収集監視方法、ファイル収集監視装置及びファイル収集監視プログラム | |
JP2019176273A (ja) | 通信制御装置、クライアント装置、通信制御方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20160927 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20160929 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6018346 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |